Hierarchical Edge Computing: A Novel Multi-Source Multi-Dimensional Data Anomaly Detection Scheme for Industrial Internet of Things

Every year, many people around the world die because of mining accidents. Industrial Internet of Things (IIoT) can be employed to sense public safety hazards and provide early warning of accidents, thereby ensuring safe operations at underground mining, personnel positioning, and specific items supervision and emergency response. Real-time data anomaly detection can predict the probability of occurrence of the abnormal event. However, massive heterogeneous monitoring data, poor wireless environment and data spatio-temporal association have posed a serious challenge to data anomaly detection for underground mining. Existing methods are mostly concerned about single data or processing at cloud platform, with little regard for the time and space association. Focus on the accuracy and timeliness of data anomaly detection, a novel multi-source multi-dimensional data anomaly detection scheme based on hierarchical edge computing model is presented in this paper. Firstly, a hierarchical edge computing model is proposed to realize load balance and low-latency data processing at the sensor end and base-station end. Then a single-source data anomaly detection algorithm is designed based on fuzzy theory, which can comprehensively analyze the anomaly detection results of multiple consecutive moments. Finally, a multi-source data anomaly detection algorithm executed at the base-station end is designed to consider the sensing data associated attributes of time and space. Experimental results reveal that the proposed scheme has higher detection accuracy and lower processing delay compared with traditional solutions.

[1]  Qixin Wang,et al.  Inter-cell Channel Time-Slot Scheduling for Multichannel Multiradio Cellular Fieldbuses , 2015, 2015 IEEE Real-Time Systems Symposium.

[2]  H. Şebnem Düzgün,et al.  Spatio-temporal anomaly detection for environmental impact assessment: a case of an abandoned coal mine site in Turkey , 2017, Optical Engineering + Applications.

[3]  Deming Wang,et al.  A statistical analysis of coalmine fires and explosions in China , 2019, Process Safety and Environmental Protection.

[4]  Zhiwen Zeng,et al.  Adaption Resizing Communication Buffer to Maximize Lifetime and Reduce Delay for WVSNs , 2019, IEEE Access.

[5]  Svetha Venkatesh,et al.  Anomaly detection in large-scale data stream networks , 2012, Data Mining and Knowledge Discovery.

[6]  Lei Guo,et al.  Future Communications and Energy Management in the Internet of Vehicles: Toward Intelligent Energy-Harvesting , 2019, IEEE Wireless Communications.

[7]  Wanyi Gu,et al.  A novel method to evaluate clustering algorithms for hierarchical optical networks , 2012, Photonic Network Communications.

[8]  Oliver Obst,et al.  Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks , 2008, EWSN.

[9]  Wanyi Gu,et al.  Pre-configured polyhedron based protection against multi-link failures in optical mesh networks. , 2014, Optics express.

[10]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[11]  Miao Xie,et al.  Anomaly Detection in Wireless Sensor Networks , 2013 .

[12]  Anazida Zainal,et al.  Adaptive and online data anomaly detection for wireless sensor systems , 2014, Knowl. Based Syst..

[13]  Nei Kato,et al.  A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues , 2017, IEEE Communications Surveys & Tutorials.

[14]  Yuan He,et al.  From Surveillance to Digital Twin: Challenges and Recent Advances of Signal Processing for Industrial Internet of Things , 2018, IEEE Signal Processing Magazine.

[15]  Lei Wang,et al.  Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions , 2019, IEEE Communications Surveys & Tutorials.

[16]  Lei Guo,et al.  Mobile Edge Computing-Enabled Internet of Vehicles: Toward Energy-Efficient Scheduling , 2019, IEEE Network.

[17]  Kamran Ali,et al.  A WSN for Monitoring and Event Reporting in Underground Mine Environments , 2018, IEEE Systems Journal.

[18]  A. Hero,et al.  Empirical estimation of entropy functionals with confidence , 2010, 1012.4188.

[19]  Li Zhou,et al.  Energy-Latency Tradeoff for Energy-Aware Offloading in Mobile Edge Computing Networks , 2018, IEEE Internet of Things Journal.

[20]  Selwyn Piramuthu,et al.  Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review , 2018, Decis. Support Syst..

[21]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[22]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[23]  Marimuthu Palaniswami,et al.  Detecting data anomalies in wireless sensor networks , 2010 .

[24]  Wanyi Gu,et al.  A Novel Framework and the Application Mechanism with Cooperation of Control and Management in Multi-domain WSON , 2012, Journal of Network and Systems Management.

[25]  Xiangjie Kong,et al.  A Cooperative Partial Computation Offloading Scheme for Mobile Edge Computing Enabled Internet of Things , 2019, IEEE Internet of Things Journal.

[26]  Zhiwu Li,et al.  Anomaly detection in time series based on interval sets , 2018 .

[27]  Feng Xia,et al.  Deep Reinforcement Learning for Vehicular Edge Computing , 2019, ACM Trans. Intell. Syst. Technol..

[28]  Bin Li,et al.  Distributed Protocol for Removal of Loop Backs with Asymmetric Digraph Using GMPLS in P-Cycle Based Optical Networks , 2011, IEEE Transactions on Communications.

[29]  Jinoh Kim,et al.  A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.

[30]  Xuxun Liu Node Deployment Based on Extra Path Creation for Wireless Sensor Networks on Mountain Roads , 2017, IEEE Communications Letters.

[31]  Wanyi Gu,et al.  Fragmentation assessment based on-line routing and spectrum allocation for intra-data-center networks with centralized control , 2014, Opt. Switch. Netw..

[32]  Djamel Djenouri,et al.  A Survey on Urban Traffic Anomalies Detection Algorithms , 2019, IEEE Access.

[33]  Feng Xia,et al.  Joint Computation Offloading, Power Allocation, and Channel Assignment for 5G-Enabled Traffic Management Systems , 2019, IEEE Transactions on Industrial Informatics.

[34]  Wanyi Gu,et al.  Novel spectrum properties of the periodic π-phase-shifted fiber Bragg grating , 2012 .

[35]  Zain Anwar Ali,et al.  Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network , 2019, Wirel. Pers. Commun..

[36]  A RassamMurad,et al.  Adaptive and online data anomaly detection for wireless sensor systems , 2014 .

[37]  Xuxun Liu,et al.  Data Drainage: A Novel Load Balancing Strategy for Wireless Sensor Networks , 2018, IEEE Communications Letters.

[38]  Sanghyun Seo,et al.  ADSTREAM: Anomaly Detection in Large-Scale Data Streams Using Local Outlier Factor Based on Micro-Cluster , 2017 .

[39]  Gerhard P. Hancke,et al.  A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study , 2018, Sensors.

[40]  Tiago M. Fernández-Caramés,et al.  A Review on Human-Centered IoT-Connected Smart Labels for the Industry 4.0 , 2018, IEEE Access.

[41]  Shusen Yang,et al.  Distributed Real-Time Anomaly Detection in Networked Industrial Sensing Systems , 2015, IEEE Transactions on Industrial Electronics.

[42]  Oliver Obst,et al.  Using Echo State Networks for Anomaly Detection in Underground Coal Mines , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[43]  Anazida Zainal,et al.  One-Class Principal Component Classifier for anomaly detection in wireless sensor network , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).

[44]  VenkateshSvetha,et al.  Anomaly detection in large-scale data stream networks , 2014 .

[45]  Wanyi Gu,et al.  The further investigation of the true time delay unit based on discrete fiber Bragg gratings , 2012 .

[46]  Antonio Liotta,et al.  Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.

[47]  Yaning Liu,et al.  Anomaly detection in medical WSNs using enclosing ellipse and chi-square distance , 2014, 2014 IEEE International Conference on Communications (ICC).

[48]  Alfred O. Hero,et al.  k-nearest neighbor estimation of entropies with confidence , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[49]  Song Guo,et al.  Distributed Segment-Based Anomaly Detection With Kullback–Leibler Divergence in Wireless Sensor Networks , 2017, IEEE Transactions on Information Forensics and Security.

[50]  Sayyed Majid Mazinani,et al.  A Novel Anomaly Detection Algorithm Using DBSCAN and SVM in Wireless Sensor Networks , 2017, Wireless Personal Communications.